A proposal for an e-voting system and its legal consequences

Size: px
Start display at page:

Download "A proposal for an e-voting system and its legal consequences"

Transcription

1 A proposal for an e-voting system and its legal consequences STAVROS VALSAMIDIS KALLIOPI KALAMPOUKA SOTIRIOS KONTOGIANNIS THEODOSIOS THEODOSIOU Department of Accountancy Kavala Institute of Technology Agios Lucas GREECE (12pt Times New Roman, centered) Abstract: - In this paper we present a framework for conducting electronic elections over the web taking into consideration the legal consequences. The proposed system has to be based on open source software with its own security protocol. It will be an alternative and practical solution to existing e-voting systems applications not only for communities, universities and organizations but for national and communities elections as well. Key-Words: - E-voting, Electronic Election Systems, Requirements, Types, Legal Aspects, Technical Aspects 1 Introduction E-democracy is a term produced from the words "Electronic" and "democracy," and comprises the use of electronic communications technologies such as the Internet in order to enhance democratic processes and provide increased opportunities for individuals and communities to interact with government and for the government to seek input from the community [37]. E-democracy is at the convergence of traditional democratic processes and Internet technology [34]. E-democracy can also be deemed as the use of electronic communications technologies, in the policy-making process and the government-citizen relations in order to encourage a direct and more active citizen participation in public life and the decision-making process. E-democracy is also sometimes referred to as cyberdemocracy [59], teledemocracy [2] or digital democracy. E-voting is a term produced from the words "Electronic" and "voting" and encompasses several different types of voting, embraces both electronic means of casting a vote and electronic means of counting votes [41]. Electronic voting is the option of using electronic means to vote in referendums and elections, including polling place e-voting and remote e-voting. Remote e-voting options include voting over the Internet and the use of personal digital assistants (PDAs) or telephones or mobile phones to cast a vote electronically. Electronic voting technology can include punch cards, optical scan voting systems and specialized voting kiosks. It can also involve transmission of ballots and votes via telephones, private computer networks or the Internet. E-democracy includes within its scope electronic voting, but has a much wider span than this single aspect of the democratic process. Other premier web applications that offer a means of electronic democracy are: electronic elections, electronic debates, electronic pre-election gatherings, public speeches, electronic parliament, electronic government and others. Electronic elections are nowadays one of the most popular issues of e- democracy. This has led to the development of applications. The problem that arises is that such applications are created either on demand for a specific election process, or experimentally for scientific purposes. Modern Electronic Voting Systems (EVSs) can be divided into two major categories: DRE (Direct ISBN:

2 Recording Electronic) voting systems and Internet voting systems. DRE systems utilize touch screens, keyboards, NFC and smart card equipment for voter authentication and voting purposes. The voting process takes place in voting terminals, located at specific polling areas which are directly connected, or not, to a central station [13]. The votes are immediately added to a running tally stored at the remote central station, if this station exists, or, if not, in the DRE s storage system (hard disk, memory card). Mail voting systems also belong to this category. DRE systems have two distinct characteristics: (1) DRE systems combine hardware and software to one embedded device, keeping the implementation hidden for both hardware and software and (2) utilize physical security in terms of specific voting areas (polling stations) in order to assure EVS system authentication and security requirements. One of the first DRE EVSs used is SENSUS DRE, created by Lorrie Faith Cranor at St. Louis University, Washington in 1995 [12]. It uses blind signatures to assure that voters will vote only once. Its initial purpose was to replace voting by mail. Today it is considered quite old and it has been abandoned. The company TrueBallot, Inc has presented the DRE system [58], which is used by companies, organisations, universities, associations and by teams of users for the conduct of electronic elections. The Trueballot system offers 3 basic operations: ScanVOTE / TouchVOTE Ballot-On- Demand which imitates physical voting, WebVOTE which uses Internet and TeleVOTE which uses the telephone as a means of conducting the voting. The DRE Diebold AccuVote-TS system [13], used in US elections, constitutes an embedded device with both hardware and software so that a user by using a touch screen with a card reader may authenticate and vote, after being authenticated by polling officials (votes are cast at specific poll sites) [4]. The SureVote company [56], provides a similar system, in which the users authenticate themselves and their right to vote using a numeric personal identification code and a numeric ballot code [4]. It also offers a web-based Internet EVS system. Internet EVS systems, on the other hand, use a computer or digital television or a mobile phone (by any hardware means) with custom software provided by a central voting station or stations over the Internet (using Internet software technologies), for voting purposes. Elections are held everywhere using remote Internet voting, thus increasing EVS system s availability usability and scalability. This, of course, may be contentious because it is difficult to verify that the voter is who they claim to be. Both anonymity and privacy may easily be compromised. This opens the door to voter coercion and vote buying. Such drawbacks lead to the implementation of more strict security mechanisms on Internet EVSs. Such systems are presented in the next paragraph. Safevote is a software company which offers a variety of products supporting both public and private elections using Internet voting [51]. The Rijnland Internet Election System (RIES) is a system designed for voting in public elections over the Internet [22]. Moreover, browser based Agile E- Voting system is another effort to provide a practical, voter-friendly e-voting system [55]. The Global Election Company provides election.com [20], which is global election software. It offers poll site voting and remote electronic voting. Finally, GNU FREE (Free Referenda and Elections Electronically [21] is an Internet based system which started being developed in 1999 as a free electronic voting EVS system. Its implementation is database and platform independent. Today this project has been abandoned. Various publications have addressed the benefits and risks of e-voting systems [41, 44, 1]. Electronic forms of voting have been implemented at some scale in many different countries, though in very different ways [46, 48]. The first electronic election scheme was proposed by [8] who is the inventor of ecash. He describes a unique method where voters can positively confirm their ballots, both at the polling station and also after the election; to be sure they are correctly entered into the tallies, without revealing their choices. This groundbreaking work may eventually form the basis of secure and auditable future elections [10]. Mercuri has been investigating a wide range of electronic voting issues and addresses usability issues [38]. A paper which thoroughly surveys issues relating to usability of electronic voting systems and reports on a series of studies was written by [4]. It was an early indication of machine failures with the Diebold equipment. Another interesting paper, which details the requirements, design and implementation of a special type of electronic voting system, the remote on-line voting system, suitable for a university setting where students can cast their votes anytime, anywhere, using either fixed or mobile electronic devices including personal computers, personal digital assistants and smart and regular phones, is proposed by [47]. The usability issues in various election systems, with the conclusion that newer technologies are not necessarily an improvement for voters is proposed by [49]. The use of distance electronic voting ISBN:

3 systems, in the support of non political elections, has been researched in many studies [16, 57]. An overview of voting security threats and vulnerabilities along with an assessment of strengths and weaknesses of potential solutions is presented by Fischer [18]. The paper is organized as follows. Section 2 describes the problem formulation with the requirements of an e-voting system, the existing EVS (Electronic Voting System) technologies along with their corresponding applications and the legal aspects. Section 3 presents the problem solution in terms of technical design and legal consequences. Finally, section 4 deals with the discussion related to advantages and disadvantages of such a system. In section 5 useful conclusions are drawn after the presentation of the proposed system. 2 Problem Formulation In this section the legal issues, the requirements and the types of EVS systems are described in detail. 2.1 Legal Issues According to Article 51 para 3-5 of Greek Constitution "3. The deputies are elected by direct universal suffrage and secret ballot by citizens who have the right, as provided by law. The law can not restrict the right to vote unless there has completed a minimum age or legal incapacity or as a result of irrevocable criminal conviction for certain crimes. 4. The parliamentary elections held simultaneously throughout the Territory.... As for the voters, the principle of simultaneous of elections shall not prevent the exercise of their right to vote by postal vote or other appropriate means, provided that counting and announcement of results is carried out whenever possible and throughout the State. 5. The voting is compulsory.". Τhis provision establishes the following basic, essential and fundamental principles of: (a) Universality, is deliberate on the part of the State minimization of the skills required in order for a person to participate as a voter in elections. (b) Immediacy is the non-interference will or intermediate body between the expression of the choice of the voter and the enactment of the electoral outcome. (c) Secrecy is to ensure nondisclosure of the content of the vote in another person outside of the voting [30]. Simultaneity means that the expression of individual electoral preference expressed without the possibility of knowledge of other results in the same election. 2.2 EVS Requirements Electronic Voting Systems requirements fulfil generic functionalities and attributes of an electronic voting system [3, 32, 50, 11]. System requirements define electronic voting system functionality. These capabilities apply to three different phases of the voting process: Before the voting process occurs, during the voting process and after the voting process completion for a voter x [19, 40]. The prevoting process requirements of an electronic voting system are the following: Authenticity: This means that only selected voters may vote and the electronic voting system must provide proof with the use of appropriate authentication mechanisms that a selected voter is the one that cast the vote [23]. Freedom: The electronic voting system must provide the ability to all selected voters to vote for whatever candidate they wish, or none for an election process [23]. Eligibility: Only eligible voters are permitted to vote [12, 15, 17, 23, 26]. Practicability: No extra skills are required to vote and no additional equipment is required [12, 26, 33, 35]. During election processes, an electronic voting system must maintain a high standard of the following capabilities: Robustness: The electronic voting system must provide all the necessary mechanisms to prevent interruption of the election process or system s denial of service. A malicious voter cannot frustrate or disturb the election [17, 9, 27]. Security: During an election process the electronic voting system must maintain vote integrity, voter anonymity when casting the vote and encrypt the vote in order to prevent eavesdropping [52, 53]. Uniqueness: The electronic voting system must provide appropriate mechanisms that ensure that voters are uniquely identified for an election process and vote only once [12, 15, 17, 23, 26, 33, 35, 36]. Verifiability: The electronic voting system must provide the voter a proof receipt that his/her vote drop at the tally was acknowledged. This receipt may be used after the voting process by the voter to confirm that his/her vote was accounted by the election committee [7]. Fairness: The electronic voting system must not provide any information about the outcome of an election process during the election process. No one can learn the voting outcome before the tally [17]. Democracy: All votes are equal and have the same weight. The principle: One voter- one vote ISBN:

4 must be sustained by the electronic voting system during an election process [40]. After an election process, there are also electronic voting system requirements that must be fulfilled: Privacy (anonymity): When the votes are verified by the election committee, the electronic voting system must provide anonymity mechanisms so that the voter cannot be traced back by his/her vote. There is no way to derive a link between the voter s identity and the marked ballot. The voter remains anonymous [9, 12,15,17,23,26,33,36]. Accuracy: All valid votes are counted correctly. The electronic voting system must count all votes and must count them as cast. A voter s vote cannot be altered, duplicated, or removed. Of course in a real electronic voting system appropriate error thresholds must be set that will indicate the validity of an election process [53,9,12,15,17,27,26,33,36]. Integrity: The electronic voting system sustains the vote integrity [53]. Uncoercibility: The electronic voting system may use appropriate mechanisms to prevent a user proving how he/she voted [5,12,23,25,43]. There are also system-specific requirements that must also be taken into consideration for the design of an electronic voting system. Such requirements are the following: Accessibility: The electronic voting system must be accessible to voters regardless of their geographical location or electronic equipment they use, so as to access the electronic voting system (computers, PDAs, cable TV, mobile phones et al. [52, 4]. Availability: During a voting process, the electronic voting system must maintain the same availability response for all voters. Today, availability problems of Internet services are less network link related and more erroneous service design and service user sustainability related [24, 52]. Reliability: Electronic voting system reliability is identified by a set of performance metrics. Efficiency: The computations can be performed within a reasonable amount of time [26, 33]. Mobility: There are no restrictions on the location where voters can cast their ballots. The electronic voting system must provide methods to cache user voting sessions in case a voter faces roaming problems or interacts with the electronic voting systems over network interfaces with latency problems (satellite links, mobile phones, wearable devices [12, 26,33]. Multi language support: The electronic voting system must provide multi-language support for voter registration, election process and election results display [38]. Care for Special Needs: The electronic voting system must provide ways of interaction with the system for people with special needs [4]. There are also election-specific requirements depending on the conditions of conducting the electoral process, e.g. the exclusion of a candidate from the electoral committee of the elections. 2.3 E-voting types There are many ways to categorize voting systems depending on the needs they have to fulfil, the technologies they use, the voting location, whether they are supervised or not. We could also subcategorize technologies according to the network and the equipment they use. We show the taxonomy of voting systems based on previous [42, 47, 61]. We divide the elections into the physical voting and electronic voting Physical voting It is divided into conventional voting and epistolary voting. Conventional voting It can be materialized either by the typical ballots or by the epistolary voting of absentees. Computer counting It can be materialized either by optical scanning systems or by punch card systems. In the former means, the ballots are marked by voters in such a way that an optical counting machine can read them. In the latter, divots are removed from perforated cards. The ballot cards are then collected and tallied at a central polling station [45]. Computer counting systems are vulnerable to fraud and error Electronic voting It is divided into direct recording electronic voting, polling station voting, Internet/private network voting and phone voting. The latter could be a subcategory of remote voting, as will be presented later on. Direct Recording Electronic [DRE] voting Voters use touch screen systems or keyboards on PC based technologies to vote at a terminal which is directly connected to a central station [14]. The votes are immediately added to a running tally stored in a computer storage system. The final DRE tally is then moved to a central location where it is added to the tallies obtained from other DRE machines. Polling Station voting Voters use voting system clients to submit their votes electronically. The whole process is usually controlled by authorized entities. Subcategories of ISBN:

5 this category can be the means by which the voting is achieved, such as poll sites, kiosks, or any digital equipment connected to the network. Kiosk e-voting consists of voting oriented machines being used in the polling station or elsewhere, to let electors cast their votes. Votes are cast using buttons or a touch screen and are stored in an electronic memory. Poll site voting requires voters either to go to staffed polling sites and use computers to cast their votes or to use a network (Internet or private) to transfer ballots from each polling place to a centralized site, where votes are tallied and election results are published. Internet/private network voting It includes both poll site voting and remote voting. Remote voting Voters use a computer or a digital television or a mobile phone to mark their ballot. Elections held using remote voting can be contentious because it is difficult to verify that the voter is who he/she claims to be. Both anonymity and privacy are compromised because others can watch the elector vote. This opens the door to voter coercion and vote buying. Phone Phone voting also composes a separate category of electronic voting, when it is used independently of Internet/private network. Votes are cast either through a touch-tone system or through SMS text messages on mobile phones. Authentication is achieved through the use of PIN and access codes. Phone voting depends on highly centralised, private infrastructures which are also unreliable and insecure. 3 Problem Solution This framework proposes an EVS (Electronic Voting System. It has to be a secure application for the conduct of electronic elections through the Internet. It has to be a web application based on its own security protocol. It has to be also modular and tolerant enough to resist anyone who would attempt to violate security mechanisms. It will offer a combination of new features, which renders it an alternative suggestion to existing and tested e-voting systems. With the proposed system we hope to attract developers, by offering the motive of the open framework, for further development. Since the proposed e-voting system will be implemented it has to be applied and tested real elections. 3.1 Legal Aspects As, e-voting is not prohibited by Greek Constitution, the procedure followed should require strict identification and authentication of the individual. A main tool in this technical system can be the digital signature for every voter, issued by the public administration, delivered in a secure manner to identified and authenticated citizens [62]. In accordance with the principle of technological neutrality, the electronic signature can also be made via other technical means, such as mobile phone, pc/internet [31]. The second fundamental principle of the protection of privacy and voter anonymity should be applied through (a) The unequivocal identification of the voter, (b) The establishment of an election committee in order to ensure verifiability and reproducibility of the election and (c) the protection from sabotage either by external attacks or by voters or candidates attempting to disturb the elections. In order to guarantee free suffrage, firstly, the machine which the voter is using to vote must advise him/her that his/her vote has reached its destination. Secondly, the encryption of the data transmitted must be so designed as to ensure that no electronic ballot paper which has been altered will be counted. Thirdly, the way in which persons using electronic voting are guided through the procedure must not be such as to encourage them to vote precipitately or without reflection [31]. As a fourth requirement, the legislation states, that before voting, voters must have their attention explicitly drawn to the fact that, by submitting their vote by electronic means, they are playing a valid part in a ballot. Fifthly, it must not be possible for any manipulative message to appear during the process of electronic voting on the machine being used by the voter to cast the vote. Finally, as they vote, voters must be able to alter their choice before submitting their vote, or to break off the procedure. In any case the legal standards follow the pattern of the five basic principles of democratic elections and referenda: universal, equal, free, secret and direct suffrage. These five principles have to be equally applicable to e-voting as to traditional elections or referenda. However, e-voting is not ruled by specific provisions, in Greek Legislation, although the process is followed in elections collective management bodies (higher education). 3.2 Technical Aspects There are 3 main entities involved in the e-voting system: the Election, the Committee, and the Voter. The election authority is a group of administrators or system supervisors. The Election committee is a group of voters that have been selected by the authority and are responsible for interacting with the voters in order to give them access to the system. ISBN:

6 The Voter must have 2 valid accounts in order to complete the procedure of casting a vote. The procedure consists of 10 steps which are presented next: (1) Enrolment, (2) Create Voter record, (3) System Login, (4) Enter election, (5) Apply participation to election committee, (6) Check and validation by the election committee, (7) Creation of digital signature, (8) Ballot fill-in and vote casting, (9) Ballot encryption and (10) Announcement of valid ballots. Step 1: This step is mandatory for non-registered voters. In the case the voter must visit the election authority in person, and fill in the registration form. Moreover, the voter can choose a username and password with which s/he can login to the system as a simple user. Step 2: During the voter registration process, 3 cryptographic keys are created, which are: passkey, public key, and private key. The passkey is sent to the primary account, and the public key is sent to the secondary account, while the private key is securely kept in the system. Step 3: The voter logs in to the system, using the username and password, as a simple user. Step 4: The voter enters the elections using his passkey. Step 5: The voter applies for participation to the relevant election procedure. Also, the election committee is notified, and checks the voter s record. Step 6: The election committee gives the voter access to the relevant election procedure, while a random set of characters (message digest) is sent to the voter. Step 7: The voter creates a digital signature, using the system with his public key and the message digest received from the election committee. Step 8: The voter fills in the ballot, signs it with the digital signature, and sends it to the election committee, while he applies a crypt key. Step 9: The ballot contents are encrypted using the crypt key which is not stored on the system, and are temporarily saved on the system. Once the ballot is successfully validated and counted a ticket vote is sent to the voter. The voter can use this ticket vote in order to make sure that the ballot was successfully counted. Step 10: After the end of the voting procedure, all the ticketvotes that have been successfully counted are announced on the election bulletin board. If a voter does not find his/her ticketvote on this board, then s/he can fill in an application and send it to the election committee in order to reexamine the ballot. 4 Discussion There are many advantages of this new technology in comparison to manual / paper-based voting [4]. The fundamental advantages include: Accessibility The participation is less limited by geography, disability or networks. Accuracy A high profile case of manual counting inaccuracy may occur. Using e-voting, human error can be eliminated in the tally stage. Since the votes are stored electronically, it totals the votes more accurately than a human would even if he or she were to recount the votes many times over [29]. Care for Special Needs An additional feature that makes electronic voting more favourable is that it assists disabled citizens. With this feature voting would be a much easier task to complete for disabled citizens [63, 64]. Convenience E-voting is more convenient for voters. For national election, more polling booths can be set-up using remote connection for ballot collection. This reduces voters' travel time and significantly increases voter turnout. Voters are allowed to vote from any location at their convenience. Cost The use of electronic ballot removes the cost of producing a physical paper ballot. The use of some remote communication mechanisms also minimises the cost of transporting physical ballots for aggregation of voting result. Ballot counting automation using a computer application minimises administration overhead and reduces the number of officials required for the counting process. Efficiency Using some electronic means (e.g. optical mark sense sheets, touch screen voting, remote connection), tally stage to reveal voting result is made more efficient. Ballots tabulation and the aggregation of results from different polling locations can be done electronically [39]. Facilitation The citizens can access information and provide input which previously has often been restricted [38]. Multi language support Another advantage is that it appeals to citizens whose main language is not English. Electronic voting is basically a digital voting system, so the characters on the screen can be easily changed to whatever is desired by the user [29]. Timeliness ISBN:

7 It is the opportunity to participate in voting when it takes place. A vote is instantly counted, so there is no time gap between casting the ballot and counting it [29]. The machines are also hard to tamper with, because of how they are connected [54]. There are also some disadvantages in electronic voting systems. They include: Closed source code One more flaw of the electronic voting system is that its source code is closed. This means that the public cannot examine the source code on the machine, so if a programmer of the code were to be bribed, threatened, or the manufacturer itself is willing to rig an election, they would have a high chance of hacking the vote [6]. Coercion Resistance The electronic voting system has the appropriate mechanisms to prevent a user to prove how he voted. But this is also a flaw of the electronic voting system since there is no way for a voter to know what the machines record when they cast their vote and also there are no physical paper evidence available for a recount or a receipt to ensure that the voter voted for their choice [6]. This is quite a flaw, because if there is ever a crash in system, there will be no paper trail to follow. With no paper trail, there is not even the slightest chance in recreating the votes. Privacy One major obstacle to the success of e- democracy is that of citizen identification. For secure elections and other secure citizen-togovernment transactions, citizens must have some form of identification that preserves privacy [10]. Security Another drawback of the electronic voting system is the security. Software on the machines is checked only for logic-errors and vote-counting mistakes but not for security holes. Also, all the tests performed on the software were automated, and the hardware was not tested at all, which is quite a concern [10]. Basically there is no security on this software and hardware, allowing hackers to rig an election by attaching a standard keyboard to the machine and invoking supervisory commands [6]. Running under a public operation system such as Windows, which did not receive its latest security upgrades, it is vulnerable to certain viruses and worms if it should ever connect to the Internet [6]. A way around this problem would be to change to a different operating system, preferably open-source. Additional disadvantages Another flaw is that there are many vested interests that would be harmed by a more direct democracy. As technology advances, everyday things that we use become inferior. These inferior objects are then phased out of society until they show up in a museum. Though this can be a good thing, some advances can be too fast and leave the new technology very vulnerable to sceptics because of its flaws. When technology becomes involved in the voting system, it cannot be sure that the technology will even work right. The e-voting experience in Ohio in 2004 [65] is one of the well-known examples which caused many discussions about vote miscount and modification. Therefore, it is not easy to say that an accurate and faultless e-voting is likely to become viable soon for governmental elections. A quote attributed to Stalin says: Those who cast the votes decide nothing. Those who count the votes decide everything. It is clear that voting systems represent a critical component of a democracy. When voting takes place in an electronic environment, possibility of fraud is unavoidable since ensuring the trust is not an easy task [28]. At any step in the e-voting process, e-voting results can be manipulated if there is lack of verification and validation. Majority of people may accept and use e- voting, but people have some doubts about the privacy, security and accuracy of the e-voting. The deployment of e-voting systems has not to be done at the expense of conducting fair elections. It is instructive that some advocates of Internet voting [41] agree that the risks are too great for national elections where the fabric of democracy is at risk. However, they point out that there are a number of smaller elections (e.g. school boards) where participation is scanty and there is less at stake. These would be good potential candidates for experiments in Internet voting. 5 Conclusions The application of such a system is hard to convince the parties, their candidates and the voters about its reliability and integrity. There is also skepticism about the security, the anonymity and the voting documentation procedures that the system fulfils. Their concern is to ensure that the results were authentic and not manipulated, and that the anonymity of each voter would be fulfilled. A drawback related to the e-voting systems in general is the uncoercibility, i.e whether the EVS has the appropriate mechanisms to prevent a user proving how he voted. On the other hand, the voter wants to know what the machines record when they cast their vote [6]. ISBN:

8 The design of e-voting systems must be treated as a socio-technical problem and indeed one that might with benefit be treated differently in countries with differing existing practices and attitudes [60]. In fact we believe that at least equal weight must be given to socio-technical issues such as (i) system understandability and usability, and (ii) the roles, both positive and negative, likely to be played by the various people and organizations involved in the overall voting process, as is given to any attestations by technical experts as to the trustworthiness of complex e-voting hardware and software. As future work, the extension of the framework, so that other equipment such as personal digital assistances (PDAs), mobile phones, and cable TV will be applicable. Special consideration has to be given regarding disabled people. References: [1] Alvarez, R. M. & Hall, T. E. (2004). Point: Click and Vote: The Future of Internet Voting. Brookings Institution Press. [2] Artenton, F. (1987). Teledemocracy: can technology Protect Democracy?. Sage Newdury park, CA. [3] Bannet, J., Price, D., Rudys, A., Singer, J., & Wallach, D. (2004). Hack-a-vote: Security issues with electronic voting systems. In proc of the IEEE Symposium on Security and Privacy, volume 2, [4] Bederson, B. B., Lee, B. & Sherman, R. M. (2003). Electronic voting system usability issues. In Human Factors in Computing Systems: Proceedings of CHI, pages ACM. [5] Benaloh, J. C. & Tuinstra, D. (1994). Receiptfree secret-ballot elections (extended abstract). In STOC, [6] Boutin, P., (2004). "Is E-voting Safe?". PC World pp [7] Centikaya, O. & Centikaya, D. (2007). Verification and validation issues in electronic voting. The Electronic Journal of e- Government, 5(2): [8] Chaum, D. (1981). Untraceable electronic mail, return address, and digital pseudonym. Communications of the ACM, 24(2): [9] Chaum, D. (1987). Elections with unconditionally-secret ballots and disruption equivalent to breaking RSA. In proc of Computer Science on Advances in Cryptology- EUROCRYPT, [10] Chaum, D., Ryan, P. Y. A. & Schneider, S. A. (2005). A practical voter-verifiable election scheme. In ESORICS, pages [11] Chen, Y.-Y., Ke Jan, J. & Chen, C.-L. (2004). The design of a secure anonymous internet voting system. Computers & Security, 23(4): [12] Cranor, L. F. & Cytron, R. K. (1997). Sensus. A security-conscious electronic polling system for the Internet. Hawaii International Conference on System Sciences, 3:561. [13] Diebold: Diebold electronic voting machine information sheet. diebold_accuvote-ts_v0.8.pdf. (2004). Accessed 15 January [14] Dill, D., Mercuri, R., Neumann, P. & Wallach, D. (2003). Frequently asked questions about dre voting system. org/drefaq.asp. Accessed 10 January [15] Dini, G. (2003). A secure and available electronic voting service for a large-scale distributed system. Future Generation Comp. Syst., 19(1): [16] Draper, S. W. & Brown, M. I. (2004). Increasing interactivity in lectures using an electronic voting system. Journal of Computer Assisted Learning, 20: [17] Fujioka, A., Okamoto, T. & Ohta, K. (1992). A Practical Secret Voting Scheme for Large Scale Elections. In Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology, Springer-Verlag. volume 718, [18] Fischer, E. (2003). Election Reform and Electronic Voting Systems (DREs): Analysis of Security Issues, Congressional Research Service, The Library of Congress, November 4, [19] Ghassan, Z. & Taha, R. (2007). Electronic voting systems: Requirements, design, and implementation. Elsevier Computer Standards and Interfaces, 29(1): [20] Global Election Company: Election.com. Accessed 15 January [21] GNU. (1999). Gnu free referenda and elections electronically. Accessed 15 January [22] Gonggrijp, R., Hengeveld, W.-J., Hotting, E., Schmidt, S. & Weidemann, F. (2009). Riesrijnland internet election system: A cursory study of published source code. In VOTE-ID 09: Proceedings of the 2nd International ISBN:

9 Conference on E-Voting and Identity, Berlin, Heidelberg. Springer-Verlag [23] Gritzalis, D. (2002). Principles and requirements for a secure e-voting system. Computers & Security, 21(6): [24] Gritzalis, D. (2003). Secure Electronic Voting: Part III, Trends and Perspectives, Capabilities and Limitations. Kluwer Academic Publishers. [25] Hirt, M. & Sako, K. (2000). Efficient receiptfree voting based on homomorphic encryption. In proc of Advances in Cryptology EUROCRYPT, [26] Jan, J., Chen, Y.-Y. & Lin, Y. (2001). The design of protocol for e-voting on the internet. In IEEE International Carnahan Conference on Security Technology, [27] Jan, J. Tai & C.-C. (1997). A secure electronic voting protocol with ic cards. Journal of Systems and Software, 39(2): [28] Jones, D., (2005). Threats to voting systems, NIST Workshop on Threats to Voting Systems, October. [29] Kahaner, Larry. (2004). "Too Good to Give Up On" Government Enterprise pp [30] P. Kalampouka-Giannopoulou, Law of Transactions, Legal Library, [31] J. Karakostas, Law and Internet, Sakkoulas, [32] Karlof, C., Naveen, S. & Wagner, D. (2005). Cryptographic voting protocols: A systems perspective. In proc of the 14th USENIX Security. Symposium, July-August (2005). [33] Karro, J. & Wang, J. (1999). Towards a practical, secure, and very large scale online election. Computer Security Applications Conference, Annual, 0:161. [34] King, J. (2006). Democracy in the information age. Australian Journal of Public Administration, 65(2): [35] Kofler, R., Krimmer, R., Prosser, A. & Prosser, E. (2003). Electronic voting: Algorithmic and implementation issues. In Proceedings of the 36th Hawaii International Conference on System Sciences. [36] Lin, I.-C., Hwang, M.-S. & Chang, C.-C. (2003). Security enhancement for anonymous secure e-voting over a network. Computer Standards & Interfaces, 25(2): [37] Löffler, E. (2004) URL: h/ interview4.html. [38] Mercuri, R. (2002). Humanizing voting interfaces. aper.html. Paper presented at the Usability Professionals Association Conference, Orlando, Florida. [39] Miller, Harris N. (2004). E-voting Works. USA Today, News, pp.13a. [40] Mitrou, L., Gritzalis, D. & Katsikas, S. K. (2002). Revisiting legal and regulatory requirements for secure e-voting. In SEC 02: Proceedings of the IFIP TC11 17th International Conference on Information Security, , Deventer, The Netherlands, The Netherlands. Kluwer, B.V. [41] Mohen, J. & Glidden, J. (2001). The case for internet voting. Communications of the ACM, 44(1): [42] Novak, V., Locke, L. A., Hylton, H., Land, G., Morrissey, S. & Thigpen, D. (2004). The vexations of voting machines. Time, 163 (18), [43] Okamoto, T. (1997). Receipt-free electronic voting schemes for large scale elections. In Fifth Workshop on Security Protocols, volume 1, LNCS. [44] Phillips, D. M. & von Spakovsky, H. A. (2001). Gauging the risks of internet elections. Communications of the ACM, 44(1): [45] Postnote: Online Voting, UK Parliamentary Office of Science and Technology, vol. 1, no. 155, 1 4, (2001) Online: Accessed 18 January [46] Pratchett, L. & Wingfield, M. (2004). Electronic voting in the United Kingdom: lessons and limitations from the UK experience. Electronic Voting and Democracy, Palgrave Macmillan, New York, NY, [47] Qadah, G. Z. & Taha, R. (2007). Electronic voting systems: Requirements, design, and implementation. Computer Standards & Interfaces, 29(3): [48] Rezende, P. (2004). Electronic voting systems: is Brazil ahead of its time? RSA CryptoBytes, 7(2). [49] Roth-King, S. (1998). Disenfranchised by design: voting systems and the election process, Information Design Journal, Volume 9, No. 1. [50] Rubin, A.: (2001). Security considerations for remote electronic voting over the Internet. The Magazine of USENIX and SAGE, 1(26): [51] SAFEVOTE (2006). Safevote secure login ballot evs. Accessed 19 January [52] Saleh, K., El-Morr, C., Mourtada, A. & Morad, Y. (2003). Specifications for a mobile-agent platform and an internet-based mobile electronic voting application. In International Conference on Specifications for a mobile-agent platform and an internet-based mobile electronic voting application. In International Conference on Internet Computing, ISBN:

10 [53] Saltman, R. (1988). Accuracy, integrity, and security in computerized vote-tallying. U.S. Department of Commerce, National Bureau of Standards. [54] Selker, Ted. (2004). Fixing the Vote. Scientific American pp [55] Simhalu, S. K. & Takeda, K. (2007). Browser based agile e-voting system. In ASIAN, volume 4846 of Lecture Notes in Computer Science, Springer [56] SureVote. (2005). Surevote company evs system. Accessed 19 January [57] Stuart, S., Brown, M. & Draper, S. (2004). Using an electronic voting system in logic lectures: one practitioner's application, Journal of Computer Assisted Learning, vol. 20, Apr [58] Trueballot: Trueballot company, (2003). Accessed 19 January [59] Tsagarousianou, R., Tambini, D. and Bryan, C. (1998). Cyberdemocracy: Technology, Cities and Civic Networks, Routledge, London. [60] Valsamidis, S., Nerantzis, V., Kerenidou, E., Karakos, A. (2010). Survey on e-voting and electoral technology for Balkan and South- Eastern Europe countries, In Proc. of the EBEEC 2010 (pg ), Kavala, Greece. [61] Valsamidis, S., Mandilas, A., Kontogiannis, S., Karakos, A., "ELAN, an alternative approach to e-voting systems, focused on elections data analysis", (MIBES) 2011 International Conference, September 2011, Serres, Greece. [62] J. Velentzas, Law of technology and innovation, Ius, [63] Voting Accessibility for the Elderly and Handicapped Act. (1994). 42 U.S.C et. seq. [64] Voting System Accessibility Comparison. (2001). Nat l Organization on Disability, Washington, DC. [65] Wikipedia (2007). US presidential election controversy and irregularities, Available: _U.S._presidential_election_controversy_an d_irregularities, last accessed 10 March ISBN:

CHAPTER 2 LITERATURE REVIEW

CHAPTER 2 LITERATURE REVIEW 19 CHAPTER 2 LITERATURE REVIEW This chapter presents a review of related works in the area of E- voting system. It also highlights some gaps which are required to be filled up in this respect. Chaum et

More information

E-Voting, a technical perspective

E-Voting, a technical perspective E-Voting, a technical perspective Dhaval Patel 04IT6006 School of Information Technology, IIT KGP 2/2/2005 patelc@sit.iitkgp.ernet.in 1 Seminar on E - Voting Seminar on E - Voting Table of contents E -

More information

Secure Electronic Voting: Capabilities and Limitations. Dimitris Gritzalis

Secure Electronic Voting: Capabilities and Limitations. Dimitris Gritzalis Secure Electronic Voting: Capabilities and Limitations Dimitris Gritzalis Secure Electronic Voting: Capabilities and Limitations 14 th European Forum on IT Security Paris, France, 2003 Prof. Dr. Dimitris

More information

SMART VOTING. Bhuvanapriya.R#1, Rozil banu.s#2, Sivapriya.P#3 Kalaiselvi.V.K.G# /17/$31.00 c 2017 IEEE ABSTRACT:

SMART VOTING. Bhuvanapriya.R#1, Rozil banu.s#2, Sivapriya.P#3 Kalaiselvi.V.K.G# /17/$31.00 c 2017 IEEE ABSTRACT: SMART VOTING Bhuvanapriya.R#1, Rozil banu.s#2, Sivapriya.P#3 Kalaiselvi.V.K.G#4 #1 Student, Department of Information Technology #2Student, Department of Information Technology #3Student, Department of

More information

Secure Electronic Voting: New trends, new threats, new options. Dimitris Gritzalis

Secure Electronic Voting: New trends, new threats, new options. Dimitris Gritzalis Secure Electronic Voting: New trends, new threats, new options Dimitris Gritzalis 7 th Computer Security Incidents Response Teams Workshop Syros, Greece, September 2003 Secure Electronic Voting: New trends,

More information

Secure and Reliable Electronic Voting. Dimitris Gritzalis

Secure and Reliable Electronic Voting. Dimitris Gritzalis Secure and Reliable Electronic Voting Dimitris Gritzalis Secure and Reliable Electronic Voting Associate Professor Dimitris Gritzalis Dept. of Informatics Athens University of Economics & Business & e-vote

More information

E- Voting System [2016]

E- Voting System [2016] E- Voting System 1 Mohd Asim, 2 Shobhit Kumar 1 CCSIT, Teerthanker Mahaveer University, Moradabad, India 2 Assistant Professor, CCSIT, Teerthanker Mahaveer University, Moradabad, India 1 asimtmu@gmail.com

More information

Secure Electronic Voting

Secure Electronic Voting Secure Electronic Voting Dr. Costas Lambrinoudakis Lecturer Dept. of Information and Communication Systems Engineering University of the Aegean Greece & e-vote Project, Technical Director European Commission,

More information

E-Voting Systems Security Issues

E-Voting Systems Security Issues E-Voting Systems Security Issues 1 Abdalla Al-Ameen, 2 Samani A. Talab 1, Deanship of the Preparatory Year,Al Jouf University, Al Jouf, Kingdom of Saudi Arabia, Abda711_su@hotmail.com *2, Department of

More information

Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects. Peter Y A Ryan Lorenzo Strigini. Outline

Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects. Peter Y A Ryan Lorenzo Strigini. Outline Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects Peter Y A Ryan Lorenzo Strigini 1 Outline The problem. Voter-verifiability. Overview of Prêt à Voter. Resilience and socio-technical

More information

Secure Voter Registration and Eligibility Checking for Nigerian Elections

Secure Voter Registration and Eligibility Checking for Nigerian Elections Secure Voter Registration and Eligibility Checking for Nigerian Elections Nicholas Akinyokun Second International Joint Conference on Electronic Voting (E-Vote-ID 2017) Bregenz, Austria October 24, 2017

More information

Privacy of E-Voting (Internet Voting) Erman Ayday

Privacy of E-Voting (Internet Voting) Erman Ayday Privacy of E-Voting (Internet Voting) Erman Ayday Security/Privacy of Elections Since there have been elections, there has been tampering with votes Archaeologists discovered a dumped stash of 190 broken

More information

DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL

DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL 1 KALAICHELVI V, 2 Dr.RM.CHANDRASEKARAN 1 Asst. Professor (Ph. D Scholar), SRC- Sastra University, Kumbakonam, India 2 Professor, Annamalai University,

More information

The usage of electronic voting is spreading because of the potential benefits of anonymity,

The usage of electronic voting is spreading because of the potential benefits of anonymity, How to Improve Security in Electronic Voting? Abhishek Parakh and Subhash Kak Department of Electrical and Computer Engineering Louisiana State University, Baton Rouge, LA 70803 The usage of electronic

More information

Statement on Security & Auditability

Statement on Security & Auditability Statement on Security & Auditability Introduction This document is designed to assist Hart customers by providing key facts and support in preparation for the upcoming November 2016 election cycle. It

More information

Electronic Voting For Ghana, the Way Forward. (A Case Study in Ghana)

Electronic Voting For Ghana, the Way Forward. (A Case Study in Ghana) Electronic Voting For Ghana, the Way Forward. (A Case Study in Ghana) Ayannor Issaka Baba 1, Joseph Kobina Panford 2, James Ben Hayfron-Acquah 3 Kwame Nkrumah University of Science and Technology Department

More information

Towards a Practical, Secure, and Very Large Scale Online Election

Towards a Practical, Secure, and Very Large Scale Online Election Towards a Practical, Secure, and Very Large Scale Online Election Jared Karro and Jie Wang Division of Computer Science The University of North Carolina at Greensboro Greensboro, NC 27402, USA Email: {jqkarro,

More information

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia State Electoral Office of Estonia General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-1.0 Date: 20 June 2017 Tallinn 2017 Annotation This

More information

COMPUTING SCIENCE. University of Newcastle upon Tyne. Verified Encrypted Paper Audit Trails. P. Y. A. Ryan TECHNICAL REPORT SERIES

COMPUTING SCIENCE. University of Newcastle upon Tyne. Verified Encrypted Paper Audit Trails. P. Y. A. Ryan TECHNICAL REPORT SERIES UNIVERSITY OF NEWCASTLE University of Newcastle upon Tyne COMPUTING SCIENCE Verified Encrypted Paper Audit Trails P. Y. A. Ryan TECHNICAL REPORT SERIES No. CS-TR-966 June, 2006 TECHNICAL REPORT SERIES

More information

L9. Electronic Voting

L9. Electronic Voting L9. Electronic Voting Alice E. Fischer October 2, 2018 Voting... 1/27 Public Policy Voting Basics On-Site vs. Off-site Voting Voting... 2/27 Voting is a Public Policy Concern Voting... 3/27 Public elections

More information

An untraceable, universally verifiable voting scheme

An untraceable, universally verifiable voting scheme An untraceable, universally verifiable voting scheme Michael J. Radwin December 12, 1995 Seminar in Cryptology Professor Phil Klein Abstract Recent electronic voting schemes have shown the ability to protect

More information

Additional Case study UK electoral system

Additional Case study UK electoral system Additional Case study UK electoral system The UK is a parliamentary democracy and hence is reliant on an effective electoral system (Jones and Norton, 2010). General elections are held after Parliament

More information

Addressing the Challenges of e-voting Through Crypto Design

Addressing the Challenges of e-voting Through Crypto Design Addressing the Challenges of e-voting Through Crypto Design Thomas Zacharias University of Edinburgh 29 November 2017 Scotland s Democratic Future: Exploring Electronic Voting Scottish Government and University

More information

City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013

City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013 City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013 Demonstration Time: Scheduled Breaks: Demonstration Format: 9:00 AM 4:00 PM 10:15 AM 10:30

More information

Electronic Voting Systems

Electronic Voting Systems Electronic Voting Systems The Impact of System Actors to the Overall Security Level C. Lambrinoudakis *, V. Tsoumas +, M. Karyda +, D. Gritzalis +, S. Katsikas * * Dept. of Information and Communication

More information

EXPERIENCING SMALL-SCALE E-DEMOCRACY IN IRAN. Mohsen Kahani Department of Computer Engineering,

EXPERIENCING SMALL-SCALE E-DEMOCRACY IN IRAN. Mohsen Kahani Department of Computer Engineering, EJISDC (2005) 22, 5, 1-9 EXPERIENCING SMALL-SCALE E-DEMOCRACY IN IRAN Mohsen Kahani (kahani@um.ac.ir) Department of Computer Engineering, Ferdowsi University of Mashhad, Mashhad, Iran Abstract Electronic

More information

Key Considerations for Implementing Bodies and Oversight Actors

Key Considerations for Implementing Bodies and Oversight Actors Implementing and Overseeing Electronic Voting and Counting Technologies Key Considerations for Implementing Bodies and Oversight Actors Lead Authors Ben Goldsmith Holly Ruthrauff This publication is made

More information

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM Updated February 14, 2018 INTRODUCTION Tarrant County has been using the Hart InterCivic eslate electronic voting system for early

More information

PRIVACY PRESERVING IN ELECTRONIC VOTING

PRIVACY PRESERVING IN ELECTRONIC VOTING PRIVACY PRESERVING IN ELECTRONIC VOTING Abstract Ai Thao Nguyen Thi 1 and Tran Khanh Dang 2 1,2 Faculty of Computer Science and Engineering, HCMC University of Technology 268 Ly Thuong Kiet Street, District

More information

Introduction of Electronic Voting In Namibia

Introduction of Electronic Voting In Namibia Use of ICT in Electoral Processes Introduction of Electronic Voting In Namibia Commissioner U. Freyer Electoral Commission of Namibia Praia, Cape Verde November 2017 1 Presentation Outline 1. Background

More information

Electronic Voting: An Electronic Voting Scheme using the Secure Payment card System Voke Augoye. Technical Report RHUL MA May 2013

Electronic Voting: An Electronic Voting Scheme using the Secure Payment card System Voke Augoye. Technical Report RHUL MA May 2013 Electronic Voting: An Electronic Voting Scheme using the Secure Payment card System Voke Augoye Technical Report RHUL MA 2013 10 01 May 2013 Information Security Group Royal Holloway, University of London

More information

SEMINAR WORK: E- ELECTIONS AND E- VOTING - THE CASE OF SWITZERLAND AND FRANCE

SEMINAR WORK: E- ELECTIONS AND E- VOTING - THE CASE OF SWITZERLAND AND FRANCE SEMINAR WORK: E- ELECTIONS AND E- VOTING - THE CASE OF SWITZERLAND AND FRANCE STUDENT NAME: Adrian Dulaj STUDENT NUMBER: 09 336 595 COURSE NAME: Masters in European Business DEPARTMENT: Department of SES

More information

Trusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language)

Trusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language) April 27, 2005 http://www.oasis-open.org Trusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language) Presenter: David RR Webber Chair OASIS CAM TC http://drrw.net Contents Trusted Logic

More information

Online Voting System Using Aadhar Card and Biometric

Online Voting System Using Aadhar Card and Biometric Online Voting System Using Aadhar Card and Biometric Nishigandha C 1, Nikhil P 2, Suman P 3, Vinayak G 4, Prof. Vishal D 5 BE Student, Department of Computer Science & Engineering, Kle s KLE College of,

More information

Swiss E-Voting Workshop 2010

Swiss E-Voting Workshop 2010 Swiss E-Voting Workshop 2010 Verifiability in Remote Voting Systems September 2010 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Auditability in e-voting Types of verifiability

More information

Security Analysis on an Elementary E-Voting System

Security Analysis on an Elementary E-Voting System 128 Security Analysis on an Elementary E-Voting System Xiangdong Li, Computer Systems Technology, NYC College of Technology, CUNY, Brooklyn, New York, USA Summary E-voting using RFID has many advantages

More information

STATE OF NEW JERSEY. SENATE, No th LEGISLATURE

STATE OF NEW JERSEY. SENATE, No th LEGISLATURE SENATE, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED JANUARY, 0 Sponsored by: Senator NIA H. GILL District (Essex and Passaic) Senator SHIRLEY K. TURNER District (Hunterdon and Mercer) SYNOPSIS Requires

More information

IC Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes

IC Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes IC 3-11-15 Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes IC 3-11-15-1 Applicability of chapter Sec. 1. Except as otherwise provided,

More information

Key Considerations for Oversight Actors

Key Considerations for Oversight Actors Implementing and Overseeing Electronic Voting and Counting Technologies Key Considerations for Oversight Actors Lead Authors Ben Goldsmith Holly Ruthrauff This publication is made possible by the generous

More information

Smart Voting System using UIDAI

Smart Voting System using UIDAI IJIRST National Conference on Networks, Intelligence and Computing Systems March 2017 Smart Voting System using UIDAI Mrs. Nandhini M 1 Mr. Vasanthakumar M 2 1 Assistant Professor 2 B.Tech Final Year Student

More information

WHY, WHEN AND HOW SHOULD THE PAPER RECORD MANDATED BY THE HELP AMERICA VOTE ACT OF 2002 BE USED?

WHY, WHEN AND HOW SHOULD THE PAPER RECORD MANDATED BY THE HELP AMERICA VOTE ACT OF 2002 BE USED? WHY, WHEN AND HOW SHOULD THE PAPER RECORD MANDATED BY THE HELP AMERICA VOTE ACT OF 2002 BE USED? AVANTE INTERNATIONAL TECHNOLOGY, INC. (www.vote-trakker.com) 70 Washington Road, Princeton Junction, NJ

More information

The E-voting Controversy: What are the Risks?

The E-voting Controversy: What are the Risks? Panel Session and Open Discussion Join us for a wide-ranging debate on electronic voting, its risks, and its potential impact on democracy. The E-voting Controversy: What are the Risks? Wednesday April

More information

Estonian National Electoral Committee. E-Voting System. General Overview

Estonian National Electoral Committee. E-Voting System. General Overview Estonian National Electoral Committee E-Voting System General Overview Tallinn 2005-2010 Annotation This paper gives an overview of the technical and organisational aspects of the Estonian e-voting system.

More information

ARKANSAS SECRETARY OF STATE. Rules on Vote Centers

ARKANSAS SECRETARY OF STATE. Rules on Vote Centers ARKANSAS SECRETARY OF STATE Rules on Vote Centers May 7, 2014 1.0 TITLE 1.01 These rules shall be known as the Rules on Vote Centers. 2.0 AUTHORITY AND PURPOSE 2.01 These rules are promulgated pursuant

More information

An Application of time stamped proxy blind signature in e-voting

An Application of time stamped proxy blind signature in e-voting An Application of time stamped oxy blind signature in e-voting Suryakanta Panda Department of Computer Science NIT, Rourkela Odisha, India Suryakanta.silu@gmail.com Santosh Kumar Sahu Department of computer

More information

Security Assets in E-Voting

Security Assets in E-Voting Security Assets in E-Voting Alexander Prosser, Robert Kofler, Robert Krimmer, Martin Karl Unger Institute for Information Processing, Information Business and Process Management Department Production Management

More information

Should We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College

Should We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College Should We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College 1 Principles of Democratic Election Venice Commission universal: in principle, all humans

More information

A paramount concern in elections is how to regularly ensure that the vote count is accurate.

A paramount concern in elections is how to regularly ensure that the vote count is accurate. Citizens Audit: A Fully Transparent Voting Strategy Version 2.0b, 1/3/08 http://e-grapevine.org/citizensaudit.htm http://e-grapevine.org/citizensaudit.pdf http://e-grapevine.org/citizensaudit.doc We welcome

More information

Volume I Appendix A. Table of Contents

Volume I Appendix A. Table of Contents Volume I, Appendix A Table of Contents Glossary...A-1 i Volume I Appendix A A Glossary Absentee Ballot Acceptance Test Ballot Configuration Ballot Counter Ballot Counting Logic Ballot Format Ballot Image

More information

SECURE REMOTE VOTER REGISTRATION

SECURE REMOTE VOTER REGISTRATION SECURE REMOTE VOTER REGISTRATION August 2008 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Voter Registration Remote Voter Registration Current Systems Problems in the Current

More information

Ballot Reconciliation Procedure Guide

Ballot Reconciliation Procedure Guide Ballot Reconciliation Procedure Guide One of the most important distinctions between the vote verification system employed by the Open Voting Consortium and that of the papertrail systems proposed by most

More information

PRIVACY in electronic voting

PRIVACY in electronic voting PRIVACY in electronic voting Michael Clarkson Cornell University Workshop on Foundations of Security and Privacy July 15, 2010 Secret Ballot Florida 2000: Bush v. Gore Flawless Security FAIL Analysis

More information

Union Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes.

Union Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes. Online Voting for Credit Union Elections Helping increase voter turnout & provide accessible, efficient and secure election processes. In a time of cyber-security awareness, Federal Credit Unions and other

More information

L14. Electronic Voting

L14. Electronic Voting L14. Electronic Voting Alice E. Fischer October 28, 2014 Voting... 1/14 What is all the fuss about? Voting Systems Public Voting is Different On-Site and Off-site Voting Voting... 2/14 What is all the

More information

Design and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System

Design and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System 29 Design and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System Anna M. Shubina Department of Computer Science Dartmouth College Hanover, NH 03755 E-mail: ashubina@cs.dartmouth.edu

More information

Aadhaar Based Voting System Using Android Application

Aadhaar Based Voting System Using Android Application Aadhaar Based Voting System Using Android Application Sreerag M 1, Subash R 1, Vishnu C Babu 1, Sonia Mathew 1, Reni K Cherian 2 1 Students, Department of Computer Science, Saintgits College of Engineering,

More information

Designing issues and requirement to develop online e- voting system systems having a voter verifiable audit trail.

Designing issues and requirement to develop online e- voting system systems having a voter verifiable audit trail. PAPER ID: IJIFR/V1/E4/019 ISSN (Online):2347-1697 Designing issues and requirement to develop online e- voting system systems 1 Indresh Aggarwal, 2 Dr. Vishal Kumar 1 Research Scholar, Department of computer

More information

ARKANSAS SECRETARY OF STATE

ARKANSAS SECRETARY OF STATE ARKANSAS SECRETARY OF STATE Rules on Vote Centers May 7, 2014 Revised April 6, 2018 1.0 TITLE 1.01 These rules shall be known as the Rules on Vote Centers. 2.0 AUTHORITY AND PURPOSE 2.01 These rules are

More information

Office for Democratic Institutions and Human Rights OSCE/ODIHR DISCUSSION PAPER IN PREPARATION OF GUIDELINES FOR THE OBSERVATION OF ELECTRONIC VOTING

Office for Democratic Institutions and Human Rights OSCE/ODIHR DISCUSSION PAPER IN PREPARATION OF GUIDELINES FOR THE OBSERVATION OF ELECTRONIC VOTING Office for Democratic Institutions and Human Rights OSCE/ODIHR DISCUSSION PAPER IN PREPARATION OF GUIDELINES FOR THE OBSERVATION OF ELECTRONIC VOTING Warsaw 24 October 2008 TABLE OF CONTENTS I. INTRODUCTION...

More information

TO: Chair and Members REPORT NO. CS Committee of the Whole Operations & Administration

TO: Chair and Members REPORT NO. CS Committee of the Whole Operations & Administration TO: Chair and Members REPORT NO. CS2014-008 Committee of the Whole Operations & Administration FROM: Lori Wolfe, City Clerk, Director of Clerk s Services DATE: 1.0 TYPE OF REPORT CONSENT ITEM [ ] ITEM

More information

Act means the Municipal Elections Act, 1996, c. 32 as amended;

Act means the Municipal Elections Act, 1996, c. 32 as amended; The Corporation of the City of Brantford 2018 Municipal Election Procedure for use of the Automated Tabulator System and Online Voting System (Pursuant to section 42(3) of the Municipal Elections Act,

More information

Every electronic device used in elections operates and interacts

Every electronic device used in elections operates and interacts MONITORING ELECTRONIC TECHNOLOGIES IN ELECTORAL PROCESSES 13 CHAPTER TWO: Introduction to Electronic Technologies in Elections INTRODUCTION Every electronic device used in elections operates and interacts

More information

CRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES

CRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES Scytl s Presentation CRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES Spain Cryptography Days (SCD 2011) Department of Mathematics Seminar Sandra Guasch Researcher

More information

Electronic Voting Machine Information Sheet

Electronic Voting Machine Information Sheet Name / Model: eslate 3000 1 Vendor: Hart InterCivic, Inc. Voter-Verifiable Paper Trail Capability: Yes Brief Description: Hart InterCivic's eslate is a multilingual voter-activated electronic voting system

More information

Secured Electronic Voting Protocol Using Biometric Authentication

Secured Electronic Voting Protocol Using Biometric Authentication Advances in Internet of Things, 2011, 1, 38-50 doi:10.4236/ait.2011.12006 Published Online July 2011 (http://www.scirp.org/journal/ait) Secured Electronic Voting Protocol Using Biometric Authentication

More information

Colorado Secretary of State Election Rules [8 CCR ]

Colorado Secretary of State Election Rules [8 CCR ] Rule 7. Elections Conducted by the County Clerk and Recorder 7.1 Mail ballot plans 7.1.1 The county clerk must submit a mail ballot plan to the Secretary of State by email no later than 90 days before

More information

TokenVote: Secured Electronic Voting System in the Cloud

TokenVote: Secured Electronic Voting System in the Cloud TokenVote: Secured Electronic Voting System in the Cloud Fahad Alsolami Department of Information Technology King Abdulaziz University, KSA Abstract With the spread of democracy around the world, voting

More information

E-Voting Solutions for Digital Democracy in Knowledge Society

E-Voting Solutions for Digital Democracy in Knowledge Society 55 Informatica Economică vol. 20, no. 3/2016 E-Voting Solutions for Digital Democracy in Knowledge Society Marian STOICA, Bogdan GHILIC-MICU Department of Economic Informatics and Cybernetics, Bucharest

More information

Ad Hoc Voting on Mobile Devices

Ad Hoc Voting on Mobile Devices Ad Hoc Voting on Mobile Devices Manu Drijvers, Pedro Luz, Gergely Alpár and Wouter Lueks Institute for Computing and Information Sciences (icis), Radboud University Nijmegen, The Netherlands. May 20, 2013

More information

FAQ s Voting Method & Appropriateness to PICC Elections

FAQ s Voting Method & Appropriateness to PICC Elections Purley Masjid, 63 Whytecliffe Road South, Purley, CR8 2AZ E-mail: info@purleyicc.com Purley Islamic Community Centre Registered in England Registration No.: 06902369 Registered Charity No.: 1146668 FAQ

More information

On Some Incompatible Properties of Voting Schemes

On Some Incompatible Properties of Voting Schemes This paper appears in Towards Trustworthy Elections D. Chaum, R. Rivest, M. Jakobsson, B. Schoenmakers, P. Ryan, and J. Benaloh Eds., Springer-Verlag, LNCS 6000, pages 191 199. On Some Incompatible Properties

More information

^Sfl^.t f I I THE MUNICIPAL EXPERTS. The Voters' Guide to. Accessible Voting. ^' Ontario. .c^>_

^Sfl^.t f I I THE MUNICIPAL EXPERTS. The Voters' Guide to. Accessible Voting. ^' Ontario. .c^>_ ^Sfl^.t f I I THE MUNICIPAL EXPERTS The Voters' Guide to Accessible Voting.c^>_ ^' Ontario Note To The Clerk This guide provides details for the public on how to use the voting method being employed by

More information

Remote Internet voting: developing a secure and efficient frontend

Remote Internet voting: developing a secure and efficient frontend CSIT (September 2013) 1(3):231 241 DOI 10.1007/s40012-013-0021-5 ORIGINAL RESEARCH Remote Internet voting: developing a secure and efficient frontend Vinodu George M. P. Sebastian Received: 11 February

More information

The Security of Elections. can be done on a computer screen. As the result of this, there s been a push to add voting to the

The Security of Elections. can be done on a computer screen. As the result of this, there s been a push to add voting to the Zachary Goldman 12/13/2017 Comp116: Security The Security of Elections ABSTRACT In an age of digitalization, most everything that was previously done with pen and paper can be done on a computer screen.

More information

GAO ELECTIONS. States, Territories, and the District Are Taking a Range of Important Steps to Manage Their Varied Voting System Environments

GAO ELECTIONS. States, Territories, and the District Are Taking a Range of Important Steps to Manage Their Varied Voting System Environments GAO United States Government Accountability Office Report to the Chairman, Committee on Rules and Administration, U.S. Senate September 2008 ELECTIONS States, Territories, and the District Are Taking a

More information

Electronic Voting in Belgium Past, Today and Future

Electronic Voting in Belgium Past, Today and Future Electronic Voting in Belgium Past, Today and Future Danny De Cock K.U.Leuven ESAT/COSIC Slides available from http://godot.be/slides Electronic Voting in Belgium: Past, Today and Future 1 Outline Classic

More information

Cryptographic Voting Protocols: Taking Elections out of the Black Box

Cryptographic Voting Protocols: Taking Elections out of the Black Box Cryptographic Voting Protocols: Taking Elections out of the Black Box Phong Le Department of Mathematics University of California, Irvine Mathfest 2009 Phong Le Cryptographic Voting 1/22 Problems with

More information

Citizen engagement and compliance with the legal, technical and operational measures in ivoting

Citizen engagement and compliance with the legal, technical and operational measures in ivoting Citizen engagement and compliance with the legal, technical and operational measures in ivoting Michel Chevallier Geneva State Chancellery Setting the stage Turnout is low in many modern democracies Does

More information

THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF ELECTRONIC VOTING

THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF ELECTRONIC VOTING THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF ELECTRONIC VOTING Abbas Akkasi 1, Ali Khaleghi 2, Mohammad Jafarabad 3, Hossein Karimi 4, Mohammad Bagher Demideh 5 and Roghayeh

More information

VOTERGA SAFE COMMISSION RECOMMENDATIONS

VOTERGA SAFE COMMISSION RECOMMENDATIONS VOTERGA SAFE COMMISSION RECOMMENDATIONS Recommended Objectives, Proposed Requirements, Legislative Suggestions with Legislative Appendices This document provides minimal objectives, requirements and legislative

More information

An Overview on Cryptographic Voting Systems

An Overview on Cryptographic Voting Systems ISI Day 20th Anniversary An Overview on Cryptographic Voting Systems Prof. Andreas Steffen University of Applied Sciences Rapperswil andreas.steffen@hsr.ch A. Steffen, 19.11.2008, QUT-ISI-Day.ppt 1 Where

More information

Arthur M. Keller, Ph.D. David Mertz, Ph.D.

Arthur M. Keller, Ph.D. David Mertz, Ph.D. Open Source Voting Arthur M. Keller, Ph.D. David Mertz, Ph.D. Outline Concept Fully Disclosed Voting Systems Open Source Voting Systems Existing Open Source Voting Systems Open Source Is Not Enough Barriers

More information

Voting Protocol. Bekir Arslan November 15, 2008

Voting Protocol. Bekir Arslan November 15, 2008 Voting Protocol Bekir Arslan November 15, 2008 1 Introduction Recently there have been many protocol proposals for electronic voting supporting verifiable receipts. Although these protocols have strong

More information

Internet Voting the Estonian Experience

Internet Voting the Estonian Experience Internet Voting the Estonian Experience Sven Heiberg sven@cyber.ee Department of Information Security Systems Cybernetica AS Tartu, Estonia Abstract Estonia has offered Internet Voting as a method to participate

More information

DIRECTIVE November 20, All County Boards of Elections Directors, Deputy Directors, and Board Members. Post-Election Audits SUMMARY

DIRECTIVE November 20, All County Boards of Elections Directors, Deputy Directors, and Board Members. Post-Election Audits SUMMARY DIRECTIVE 2012-56 November 20, 2012 To: Re: All County Boards of Elections Directors, Deputy Directors, and Board Members Post-Election Audits SUMMARY In 2009, the previous administration entered into

More information

Response to the Scottish Government s Consultation on Electoral Reform

Response to the Scottish Government s Consultation on Electoral Reform Response to the Scottish Government s Consultation on Electoral Reform By Dr John Ault and Alex Ollington 12 th March 2018 1 Introduction Democracy Volunteers is the UK s leading domestic election observation

More information

M-Vote (Online Voting System)

M-Vote (Online Voting System) ISSN (online): 2456-0006 International Journal of Science Technology Management and Research Available online at: M-Vote (Online Voting System) Madhuri Mahajan Madhuri Wagh Prof. Puspendu Biswas Yogeshwari

More information

An Object-Oriented Framework for Digital Voting

An Object-Oriented Framework for Digital Voting An Object-Oriented Framework for Digital Voting Patricia Dousseau Cabral Graduate Program in Computer Science Federal University of Santa Catarina UFSC Florianópolis, Brazil dousseau@inf.ufsc.br Ricardo

More information

SECURE e-voting The Current Landscape

SECURE e-voting The Current Landscape SECURE e-voting The Current Landscape Costas LAMBRINOUDAKIS 1, Vassilis TSOUMAS 2, Maria KARYDA 2, Spyros IKONOMOPOULOS 1 1 Dept. of Information and Communication Systems, University of the Aegean 2 Karlovassi,

More information

Distributed Protocols at the Rescue for Trustworthy Online Voting

Distributed Protocols at the Rescue for Trustworthy Online Voting Distributed Protocols at the Rescue for Trustworthy Online Voting ICISSP 2017 in Porto Robert Riemann, Stéphane Grumbach Inria Rhône-Alpes, Lyon 19th February 2017 Outline 1 Voting in the Digital Age 2

More information

M-Polling with QR-Code Scanning and Verification

M-Polling with QR-Code Scanning and Verification IJSTE - International Journal of Science Technology & Engineering Volume 3 Issue 09 March 2017 ISSN (online): 2349-784X M-Polling with QR-Code Scanning and Verification Jaichithra K Subbulakshmi S B. Tech

More information

FULL-FACE TOUCH-SCREEN VOTING SYSTEM VOTE-TRAKKER EVC308-SPR-FF

FULL-FACE TOUCH-SCREEN VOTING SYSTEM VOTE-TRAKKER EVC308-SPR-FF FULL-FACE TOUCH-SCREEN VOTING SYSTEM VOTE-TRAKKER EVC308-SPR-FF VOTE-TRAKKER EVC308-SPR-FF is a patent-pending full-face touch-screen option of the error-free standard VOTE-TRAKKER EVC308-SPR system. It

More information

IC Chapter 3. Counting Ballot Card Votes

IC Chapter 3. Counting Ballot Card Votes IC 3-12-3 Chapter 3. Counting Ballot Card Votes IC 3-12-3-1 Counting of ballot cards Sec. 1. (a) Subject to IC 3-12-2-5, after the marking devices have been secured against further voting under IC 3-11-13-36,

More information

Elections, Technology, and the Pursuit of Integrity: the Connecticut Landscape

Elections, Technology, and the Pursuit of Integrity: the Connecticut Landscape Elections, Technology, and the Pursuit of Integrity: the Connecticut Landscape Theodore Bromley 1 Peggy Reeves 2 Alexander Shvartsman 3 Abstract Transition from lever voting machines to electronic voting

More information

I-A. Voting Systems As Part of Cyber Security Critical Infrastructure.

I-A. Voting Systems As Part of Cyber Security Critical Infrastructure. Developing a Framework to Improve Critical Infrastructure Cybersecurity Under Executive Order 13636 [2] ( Executive Order ), the Secretary of Commerce is tasked to direct the Director of NIST to develop

More information

2018 Municipal Election. Policies & Procedures. Internet & Telephone Voting

2018 Municipal Election. Policies & Procedures. Internet & Telephone Voting 2018 Municipal Election Policies & Procedures Internet & Telephone Voting pickering.ca Index Authority 01 Definitions 02 Application of Procedures 03 Notice 04 Nomination Papers 05 Unofficial List of Candidates

More information

SMS based Voting System

SMS based Voting System IJIRST International Journal for Innovative Research in Science & Technology Volume 4 Issue 11 April 2018 ISSN (online): 2349-6010 SMS based Voting System Dr. R. R. Mergu Associate Professor Ms. Nagmani

More information

Towards One Person, One Vote via Real-Time Voter s Registration and Identification

Towards One Person, One Vote via Real-Time Voter s Registration and Identification Towards One Person, One Vote via Real-Time Voter s Registration and Identification B. Isong 1, O. Ekabua 2 and M. Mbodila 3 1 Department of Computer Science and Information Systems, University of Venda,

More information

Punchscan: Introduction and System Definition of a High-Integrity Election System

Punchscan: Introduction and System Definition of a High-Integrity Election System Punchscan: Introduction and System Definition of a High-Integrity Election System Kevin Fisher, Richard Carback and Alan T. Sherman Center for Information Security and Assurance (CISA) Department of Computer

More information

Conditions for Processing Banking Transactions via the Corporate Banking Portal and HBCI/FinTS Service

Conditions for Processing Banking Transactions via the Corporate Banking Portal and HBCI/FinTS Service Corporate Banking Conditions for Processing Banking Transactions via the Corporate Banking Portal and HBCI/FinTS Service (Status 13 January 2018) 1. Scope of services (1) The Customer and its authorised

More information